MARC details
| 001 - CONTROL NUMBER |
| control field |
14828416 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20200126093051.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
070430s2008 njua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2007017689 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0321437349 (pbk. : alk. paper) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780321437341 (pbk. : alk. paper) |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(Sirsi) u626 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-CaNU |
| Transcribing agency |
EG-CaNU |
| Modifying agency |
EG-CaNU |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
004.695 |
| Edition number |
22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Thermos, Peter. |
| 9 (RLIN) |
12047 |
| 245 10 - TITLE STATEMENT |
| Title |
Securing VoIP networks : |
| Remainder of title |
threats, vulnerabilities, and countermeasures / |
| Statement of responsibility, etc. |
Peter Thermos and Ari Takanen. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
Upper Saddle River, NJ : |
| Name of publisher, distributor, etc. |
Addison-Wesley, |
| Date of publication, distribution, etc. |
c2008. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxiii, 359 p. : |
| Other physical details |
ill. ; |
| Dimensions |
24 cm. |
| 505 ## - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Introduction -- VoIP Architectures and Protocols -- Threats and Attacks -- VoIP Vulnerabilites -- Signaling Protection Mechanisms -- Media Protection Mechanisms -- Key Management Mechanisms -- VoIP and Network Security Controls -- A Security Framework for Enterprise VoIP Networks -- Pvider Architectures and Security -- Eterprise Architectures and Security. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 596 ## - |
| -- |
1 |
| 630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
CIT. |
| 9 (RLIN) |
14 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Internet telephony |
| General subdivision |
Security measures. |
| 9 (RLIN) |
12048 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Takanen, Ari. |
| 9 (RLIN) |
3254 |